{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-31323","assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","state":"PUBLISHED","assignerShortName":"AMD","dateReserved":"2023-04-27T15:25:41.423Z","datePublished":"2026-02-12T17:45:12.151Z","dateUpdated":"2026-02-12T18:33:47.900Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"AMD Radeon™ RX 5000 Series Graphics Products","vendor":"AMD","versions":[{"status":"unaffected","version":"AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)"}]},{"defaultStatus":"affected","product":"AMD Radeon™ PRO W5000 Series Graphics Products","vendor":"AMD","versions":[{"status":"unaffected","version":"AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)"}]},{"defaultStatus":"affected","product":"AMD Radeon™ VII","vendor":"AMD","versions":[{"status":"affected","version":"No fix planned"}]},{"defaultStatus":"affected","product":"AMD Radeon™ PRO VII","vendor":"AMD","versions":[{"status":"affected","version":"No fix planned"}]},{"defaultStatus":"affected","product":"AMD Instinct™ MI250","vendor":"AMD","versions":[{"status":"unaffected","version":"ROCm 6.2"}]},{"defaultStatus":"affected","product":"AMD Instinct™ MI300A","vendor":"AMD","versions":[{"status":"unaffected","version":"ROCm 6.2"}]},{"defaultStatus":"affected","product":"AMD Instinct™ MI210","vendor":"AMD","versions":[{"status":"unaffected","version":"ROCm 6.2"}]},{"defaultStatus":"affected","product":"AMD Instinct™ MI300X","vendor":"AMD","versions":[{"status":"unaffected","version":"ROCm 6.2"}]}],"datePublic":"2026-02-12T17:44:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA) leading to a memory safety violation potentially resulting in loss of confidentiality, integrity, or availability.<br>"}],"value":"Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA) leading to a memory safety violation potentially resulting in loss of confidentiality, integrity, or availability."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":8.4,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"LOW","subConfidentialityImpact":"LOW","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L","version":"4.0","vulnAvailabilityImpact":"LOW","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-843","description":"CWE-843  Access of Resource Using Incompatible Type (‘Type Confusion’)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD","dateUpdated":"2026-02-12T17:45:36.223Z"},"references":[{"url":"https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"AMD PSIRT Automation 1.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-12T18:33:24.608813Z","id":"CVE-2023-31323","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-12T18:33:47.900Z"}}]}}